A team of four U.S. universities and scholars discovered a new bypass attack, BranchScope, which uses the...
Vulnerability
On March 28, 2018, Cisco has released several updates to address vulnerabilities affecting Cisco IOS XE Software. A...
The S2-056 vulnerability occurs in the REST plug-in of Apache Struts2 (CVE-2018-1327). The REST Plugin is using...
Apple’s latest Mac operating system, macOS High Sierra seems to have a lot of bugs. Previously, it was...
According to securityaffairs reports recently, security researcher Giovanni Collazo discovered through the Shodan search engine that nearly 2,300...
On March 28, Drupal officially issued an important update. A serious security vulnerability involving Drupal 7.x, 8.3.x,...
On March 22, the security researcher at Dutch fintech firm VI Company published the report about Coinbase’s...
Recently, the Linux kernel was exposed to a memory corruption vulnerability (CVE-2018-8822). The vulnerability is due to incorrect...
Digital security company Digital Defense announced on Tuesday the six security vulnerabilities discovered by the company’s vulnerability...
Recently, a 15-year-old British boy, Saleem Rashid, discovered that there was a serious security hole in the cryptocurrency hardware wallet...
Recently, Bitbucket Server was discovered to have a remote code execution vulnerability (CVE-2018-5225). Through this vulnerability, authenticated users...
Recently, some developers wrote that there is an annoying memory leak problem in the GNOME Shell, and...
Ahmed discovered a serious security vulnerability in Microsoft’s Windows Remote Assistance (MSRA) feature. The vulnerability was identified...
The US Department of Homeland Security (DHS) warned in ICS-CERT advisory report released on March 13, 2018,...
Last week, the Israeli security company CTS-Labs claimed to have discovered the security risks of the AMD...